DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Sub Category
Linux-Unix
Exploit
Scanner
Crack Hack
CA auth
Linux driver
Search in result
Search
OS program list
Sort by :
«
1
2
...
.15
.16
.17
.18
.19
15720
.21
.22
.23
.24
.25
...
16281
»
CBC_DESEncryption
Downloaded:0
use of a method of encryption and decryption of encrypted data, a length of 64. the use of the feedback mechanism to use a password.
Update
: 2008-10-13
Size
: 65.87kb
Publisher
:
liudongxiao
unix_network_programming
Downloaded:0
unix Network Programming, Vol 1 socket API and X/Open Transmission Network Interface API unix Liaison Program, volume 2, inter-process communication, including two volumes of the source code
Update
: 2008-10-13
Size
: 298.03kb
Publisher
:
郭涛
WOL_RemoteMacFinder_prj
Downloaded:0
source of foreign classics `` `I feel very good ``` little ``````````````
Update
: 2008-10-13
Size
: 32.57kb
Publisher
:
mo
MSDEV_Cmd_Line
Downloaded:0
how to use a command line compiler VC procedures established procedures in mind the example source code
Update
: 2008-10-13
Size
: 2.5kb
Publisher
:
stephen
Action-Policy
Downloaded:0
XACML behavior strategy set
Update
: 2008-10-13
Size
: 3.97kb
Publisher
:
明慧
nbtstat-vc6.0
Downloaded:0
wrote of the network scanner. Based on UDP. Can check its own computer network segment where the situation
Update
: 2008-10-13
Size
: 41.76kb
Publisher
:
张宇
NetTraffic-vc6.0
Downloaded:0
written by VC 6.0 network traffic monitor. Analog Windows network monitoring. See their surveillance Now the computer network
Update
: 2008-10-13
Size
: 53.66kb
Publisher
:
张宇
showenv
Downloaded:0
show all Linux executable environment variables, including the C source code, RedHat Linux use
Update
: 2008-10-13
Size
: 5.16kb
Publisher
:
6756
doublerandomphaseencryptionofbiologytrait
Downloaded:0
procedures for the image of encryption and hidden in the encryption process, the original image encryption into white noise, allow an attacker not declassified. This procedure only for academic exchanges.
Update
: 2008-10-13
Size
: 1.55kb
Publisher
:
肖海
imageattackandencryption
Downloaded:0
this procedure only for academic exchanges, if used for other commercial purposes, I have nothing to do.
Update
: 2008-10-13
Size
: 1.21kb
Publisher
:
肖海
C8_7_2
Downloaded:0
C builder wrote on the broadcast of an example, download, and it is talked about
Update
: 2008-10-13
Size
: 4.82kb
Publisher
:
asfgwert
gongjiaocheshakaxitong
Downloaded:0
0800-099799 bus system that can balance on the card, is the identification of other vip and operates 0800-099799.
Update
: 2008-10-13
Size
: 1.79kb
Publisher
:
朝天吼
«
1
2
...
.15
.16
.17
.18
.19
15720
.21
.22
.23
.24
.25
...
16281
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.